Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
MEDFORD, NJ -- (Marketwired) -- 10/28/14 -- Watchful Software, a leading provider of data-centric information protection solutions, announced today the release of RightsWATCH Version 6.2, which introduces a number of 'industry firsts.' This newest version of the award winning data-centric protection suite adds support for users of Mac OS X, and further extends the industry-leading user experience on ubiquitous iOS and Android platforms. In addition, the new release augments the Active Directory (AD) Group management capability, dynamically enforcing immediate policy adherence to new and existing users in an organization.
"As enterprise-level security breaches continue to happen at a record pace, organizations worldwide are aggressively moving from a network-centric to a data-centric approach to secure their information," said Charles Foley, Chairman and CEO, Watchful Software. "The growth of cloud and BYOD usage is placing sensitive information at risk more than ever before, driving the need for technologies that identify sensitive data at the moment it's created, and further, to classify and protect that information so that it can only be used by authorized parties regardless of where it resides or may travel."
RightsWATCH 6.2 can now seamlessly enable Apple's Mac OS X users to classify and protect sensitive data, by extending the data classification model and the transparent application of Microsoft's Rights Management Services (RMS) into the Apple's desktop operating platform. Users of MS Office solutions running on the Mac OS X can now leverage RightsWATCH to identify and classify sensitive emails according to corporate policy, without additional effort or extensive training. Enterprise cybersecurity teams can now ensure that information created by users on these MAC systems can be classified, tagged, and protected with RMS as well as tracking all usage and access for reporting and forensic purposes.
"Security at the data layer itself is gaining an increased focus from enterprises in its entirety to encompass data identification, classification and protection," said Javvad Malik, Senior Security Analyst with 451 Research. "Additionally, with the influx of non-corporate devices, mobiles and proliferation of non-corporate cloud services, sensitive information has moved beyond the traditional technical boundaries and security strategies need to be updated to reflect the new reality."
RightsWATCH 6.2 is also designed to allow a more comprehensive user experience when using the RightsWATCH iOS and Android app, when handling sensitive data on a mobile device. Users of the RightsWATCH mobile app are now able to access not only their local mobile device directory but the company's entire Global Address List when creating classified, protected messages for a more seamless experience. In addition, the new version of RightsWATCH features real-time synchronization with Active Directory (AD) including AD Groups when managing and administering security policies. This ensures that if a user's rights over sensitive information are changed/removed, that user automatically loses any rights over that classified information, regardless of where that data may reside (even outside of the organization's network).
About Watchful Software
Watchful Software provides advanced persistent security solutions that keep sensitive information safe from security breaches resulting from accidental or malicious disclosure. Watchful was formed to protect an organization's most critical asset after its people -- its information. The company addresses the growing need for protecting sensitive and proprietary information against accidental or malicious theft, leakage, or loss. Leveraging key technologies including advanced encryption algorithms, digital rights management, and e-Biometrics, Watchful has developed a suite of solutions that ensure only authorized personnel have access to enterprise systems and information, protecting against potentially massive economic and competitive damage from cyber terrorists and information thieves.
Contact:
Joanne Hogue
Smart Connections PR
+1 (410) 658-8246
Email Contact
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs